Abstract
Due to the rapid development in technology, every network, application needs full time connectivity without disruption and delays. The Delay/Disruption Tolerant Networking (DTN) concept is suitable for applications such as rural and disaster areas networks, animal and environmental monitoring plus others. However, due to the shared and unsecured nature of such challenged networks a good cryptographic framework needed in DTN. Identity Based Cryptography (IBC) compares favorably with traditional public key cryptography while generating public key on a fly as required. In this paper, we will provide anonymity solution in DTN using IBC. This has the advantage over public key cryptography with respect to end-to-end confidentiality. Also we use pseudonyms to provide anonymity and hide the identity of the end user.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Cerf, V., et al.: Delay Tolerant Networking Architecture. IETF, Network Working Group, RFC 4838 (2007)
Fall, K.: A Delay Tolerant Network for Challenging Internet. In: SIGCOMM 2003 Conference on Application, Technologies, Architecture and Protocol for Computer communication, pp. 27–34 (2003)
Warthman, F.: A Tutorial Delay Tolerant Networks (DTNs). V 1.1, DTNRG (2003)
Scott, K., Burleigh, S.: Bundle Protocol Specification. IETF, Network Working Group, RFC 5050 (2007)
Farrell, S., Cahill, V.: Security consideration in space and delay tolerant networks. In: Second IEEE international conference, Space mission challenges for information technology, SMC-IT (2006)
Fall, K., Chakrabarthi, A.: Identity Based Cryptography for Delay Tolerant Networking (2003), http://edify.cse.lehigh.edu/EdifyTeam/edifyTeamDocs/dtn_sec.pdf
Symington, S.F., et al.: Bundle Security Protocol Specification. draft-irtf-dtnrg-bundle-security-08, IETF draft (2008)
Farrell, S., et al.: Delay-Tolerant Networking Security Overview. draft-irtf-dtnrg-sec-overview-06, IETF draft (2009)
Bhutta, M., Johnson, E., Ansa, G., Ahmed, N., Alsiyabi, M., Cruickshank, H.: Security Analysis for Delay/Disruption Tolerant Satellite and Sensor Networks. In: IWSSC 2009, Siena, Italy (September 2009)
Farrell, S., Cahill, V.: Delay and Disruption Tolerant Network (2006), ISBN. 1-59693-063-2
Weise, J.: Public Key Infrastructure Overview. Sun Blue Prints (2001)
Asokan, N., et al.: Applicability of Identity Based Cryptography in Disruption Tolerant Network. In: 1st international MobiSys workshop on mobile oppurtunistics networking, MobiOpp 2007, pp. 52–56 (2007)
Shamir, A.: Identity based cryptosystem and signature scheme. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
Gagne, M.: Identity based encryption: A survey. RSA Labortries, Cryptobytes 6 (2003)
Baek, J., et al.: A survey of Identity based cryptography. In: Proc. of Australian Unix Users Group Annual Conference (2004)
Boneh, D., Franklin, M.K.: Identity-based encryption from the weil pairing. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 213–229. Springer, Heidelberg (2007)
Seth, A., Keshav, S.: Particle security for disconnected nodes. In: First workshop on Secure Network Protocols (NPSec), pp. 31–36 (2005)
Farrell, S., Symington, S., Weiss, H.: Delay Tolerant Network Security overview. Draft-irtf-dtnrg-sec-overview-08, IRTF (2008)
Pfitzmann, A., Hansen, M.: Anonymity, unlinkability, undetectability, unobservability, pseudonymity and identity management- A consolidated proposal for terminology (2008), http://dud.inf.tudresden.de/AnonTerminology.shtml
Chaum, D.: Untraceable electronic email, return address and digital pseudonym. Communication of the ACM (1981)
Reed, M.G., et al.: Anonymous connection and onion routing. IEEE journal on selected areas in communication, 482–494 (1998)
Danezis, G., Diaz, C.: A survey of anonymous communication channels. Journal of Privacy technology (2008)
Kate, A., et al.: Anonymity and security in delay tolerant networks. In: third international conference on security and privacy, SecureComm 2007 (2007)
Lynn, B.: Paring Based Cryptography (PBC) library, http://crypto.stanford.edu/pbc/
DTN Research group, http://www.dtnrg.org/wiki/Code
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Ahmad, N., Cruickshank, H., Sun, Z. (2010). ID Based Cryptography and Anonymity in Delay/Disruption Tolerant Networks. In: Sithamparanathan, K., Marchese, M., Ruggieri, M., Bisio, I. (eds) Personal Satellite Services. PSATS 2010. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 43. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13618-4_19
Download citation
DOI: https://doi.org/10.1007/978-3-642-13618-4_19
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13617-7
Online ISBN: 978-3-642-13618-4
eBook Packages: Computer ScienceComputer Science (R0)